No Worms or Viruses Allowed - PowerPoint PPT Presentation

no worms or viruses allowed l.
Skip this Video
Loading SlideShow in 5 Seconds..
No Worms or Viruses Allowed PowerPoint Presentation
Download Presentation
No Worms or Viruses Allowed

play fullscreen
1 / 21
Download Presentation
No Worms or Viruses Allowed
Download Presentation

No Worms or Viruses Allowed

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. No Worms or Viruses Allowed How to keep your computer Lab/Classroom computers Safe and Secure: Ernest Staats MS Information Assurance, MCSE, CNA, CWNA, CCNA, Security+, I-Net+, Network+, Server+, A+ also known as Nerd Resources available @

  2. Look at Physical Issues: • Clean Inside/Outside • Vacuum keyboards and other parts • Clean Mice • Environment around the computer • Physical Security

  3. Protection from Spyware and other forms of Malware: • Hardware • Filtering appliances • Removal of access methods • Gateway firewalls • Network based IDS/IPS • Software • OS locking software • Imaging • Eliminate unneeded services • Update the OS • AV and Spyware tools

  4. Software Options to protect from Malware- • Firewalls • Desktop Firewall solutions • Antivirus it’s all about the updates and notification abilities • Desktop locking software • Browser Replacements and securing • Firefox (or others) over IE • Updates for IE

  5. Locking down workstations: • Clean Slate - Fortress Grand • Deep Freeze - Faronics • Shared Computer Toolkit – Microsoft • (This product is free but only works with XP SP2 (pro or home)) • ZEN - Novell

  6. Establish a Standardized Image: • Ghost • Most options excellent control center • Novell ZEN • Works well if you have the Novell Products • True Image • Less expensive but still a good set of features • Snapshot • One of the cheapest products but works well

  7. Eliminate Unneeded Services: • Windows • A list of windows services can be located on tech republics website. • Windows XP • • Windows 2003 server • • Linux • Linux 101: A comprehensive list of Linux services.. • • Macintosh • Securing your computer: Macintosh Quick-Click Guide •

  8. Windows • Services are removed from Windows systems by either uninstalling them with the Add/Remove Programs, by turning them off with a control panel or registry setting, or by disabling them with the Services control panel found under administrative tools. • Running the command netstat –a gives a list of all open ports on a system. • A list of windows services can be located on tech republics website. • Win XP • Windows 2003 server

  9. Linux • Linux services can be started or stopped either from the command line or form a graphical configuration tool • The command line requires one editing files in the /etc/rc.d sub-directories The most common places are in /etc/inetd.conf, in the /etc/rc1.d, /etc/rc2.d, etc. directories, and in the startup scripts. Services available through the inetd service are turned on and off by simply commenting them out of the /etc/inetd.conf file • While there are several different graphical tools depending on the Linux flavor you are using most of them will run ntsysv which can be used to check or uncheck services to run at start up (Run level specific.) • Some versions of Linux use Service Configuration (serviceconf) gui program to turn services on and off. • To completely remove a service, delete the executable files from the system that start the service. Common services are in /usr/sbin and have names that start with “in.” and end with “d”. in.ftpd • The netstat –a command lists all open ports

  10. Macintosh • Macintosh running OS 9 and earlier has all of its services controlled with a control panel. • Services can be turned on and off with the control panel and the software can be removed using the Extensions Manager control panel to remove the control panel or extension that maintains the service. • OS X common services are turned on and off using System Preferences. • Allow Remote Login check box turns on the ssh protocol. (Know what you are turning on) • open a terminal window and execute the netstat –a command to display all open network ports.

  11. Keep Your Systems Up-to-Date: • Updating Windows systems • Updating Linux systems • Updating Macintosh systems • Is your Antivirus current • do you know for sure

  12. Updating Windows Systems • Windows Update Site • The Microsoft Baseline Security Analyzer is a toolthat includes some additional checks of some critical security settings.. This tool also checks to see, • That file systems are all NTFS • If accounts have unexpiring passwords • How many administrator accounts are on this machine • If any accounts have weak passwords • That the guest account is disabled • That autologin is disabled • That restrict anonymous is set as high as possible • That Login success and failure is being audited • Download MBSA

  13. Updating Linux Systems • Maintaining Linux systems is much like maintaining Windows systems in that there is an automatic update service available for most versions of Linux. • Security Tip: Don’t install patches for services you are not using. Running the patch program will sometimes install the service. If the service is installed and you don’t need it, simply uninstalling it removes the vulnerability.

  14. Updating Macintosh Systems • Newer Macintosh systems (OS 9 and OS X) come with the Software Update service. This service automatically checks with the Apple website for software updates. • You can get information about security updates on the Apple Security Updates web page • Subscribe to the Apple Security-Announce mailing list

  15. Windows Live Safety Center • Check for and remove viruses • Learn about threats • What ports are open on your PC • Improve your PC's performance • Disk defrag and other tune up settings • Get rid of junk on your hard disk

  16. Windows Defender • Windows Defender is a free program that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software. • It is a bit of memory hog when scanning •

  17. Hardware Options to protect from Malware- • A Content filtering appliance • Eliminate Floppy , USB, or CD ROM boot access • Develop school wide policies for controlling who has access to what resources (The most important step in the process & administration must endorse policies) • Gateway Firewall to protect the network perimeter • Network based IDS/IPS to detect a local infection on the network

  18. Suggested Practices • Use a defense in Depth strategy • Gateway firewalls and content scanners • Server protection • Firewall, AV, spyware scanning, OS updating • Imaging • Desktop protection • Lock the workstations • AV and OS updated daily • Eliminate unneeded services • Install anti-spyware software that will scan daily • Make an image of the systems • Use Microsoft’s Baseline Security Analyzer to test systems

  19. How to clean an infected machine: • Specialized Boot disk • UBCD4Win - • Microsoft AntiSpyware and Windows Defender (free) • Other AntiSpyware • Antivirus Boot disk repair • Trend Micro House Call/ one time cleaning • Last resort Reformat the computer

  20. Resources • Connecting to the Internet Securely; Protecting Home Networks( • A list of windows services can be located on tech republics website. • Windows XP • • Windows 2003 server • • Linux 101: A comprehensive list of Linux services.. •

  21. Resources Continued • This PPT and a list of resources • • Step by step instructions for networking • Common Ports used by trojans (2006) • • MS Windows Defender • • MS Windows Live Safety Center • • MS Shared PC tool Kit • • Home PC Firewall Guide (excellent reviews) •